Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
8481
-
8482
Dynamic Patch-Based Sample Generation for Pulmonary Nodule Segmentation in Low-Dose CT Scans Using 3D Residual Networks for Lung Cancer Screening
Published 2025-03-01“…To address the challenges of processing large CT volumes, an efficient patch-based extraction pipeline was developed. …”
Get full text
Article -
8483
Achieving Business Excellence by Optimizing Corporate Forensic Readiness
Published 2017-02-01“…Proposed model can, first of all, help managers of small and medium-sized companies to justify their decisions to employ digital forensic investigators and include them in their information security teams in order to choose the optimal CCIDFI model and improve forensic readiness in the computer incident management process that will result with minimization of potential losses of company in the future and improve its business quality.…”
Get full text
Article -
8484
Electromagnetic radiation security estimation on the residential building roof for cellular antenna
Published 2015-09-01“…The difference between the developed model and the known ones lies within the research possibility not only in the computational points but within a whole computational plane. …”
Get full text
Article -
8485
Digital Humanities: Is it a New Science or a Set of Models and Practices of the Global Network Project?
Published 2020-10-01“…In general, those changes characterize the process of the new science image development in the network society.…”
Get full text
Article -
8486
Criteria and indicators for assessing the quality of the investigation of an information security incident as part of a targeted cyberattack
Published 2024-05-01“…Methods informed by purposeful process efficiency and set theory are used along with expert evaluation approaches.Results. …”
Get full text
Article -
8487
Crowdsourcing Evaluation of Video Summarization Algorithm
Published 2024-11-01“…This technique helps in dividing a task into multiple parts, and each of these parts is then evaluated using a large group of individuals to solve problems that are otherwise difficult to solve using traditional computational machines. In this study, we offer a crowdsourcing subjective experiment in which summaries of processed video sequences are evaluated. …”
Get full text
Article -
8488
THE IMPACT OF LIQUEFIED NATURAL GAS COMPOSITION AND TECHNOLOGICAL CHARACTERISTICS OF THE STARTING STORAGE OF THE EQUIPMENT AT THE TIME OF OCCURRENCE OF THE PHENOMENON OF ROLLOVER
Published 2019-07-01“…The use of the ANSYS software package of computational fluid dynamics in the process of heat and mass transfer of the stratified liquid in the liquefied natural gas storage is necessary when calculating the increased accuracy.…”
Get full text
Article -
8489
Prediction of Lupus Classification Criteria via Generative AI Medical Record Profiling
Published 2025-03-01Get full text
Article -
8490
DIGITAL FILTERS IMPLEMENTATION IN MICROPROCESSOR-BASED RELAY PROTECTION
Published 2016-09-01Get full text
Article -
8491
-
8492
Hermitian matrix inversion algorithm
Published 2015-06-01“…Because of complexity and a large operation number, Gaussian-Jordan method does not allow realizing the real time signal processing in computing systems of the adaptive antenna arrays that are widely used in communication, radiolocation, and radio navigation systems. …”
Get full text
Article -
8493
Weapon detection with FMR-CNN and YOLOv8 for enhanced crime prevention and security
Published 2025-07-01“…To overcome these challenges, the suggested system combines closed-circuit television (CCTV) surveillance cameras with advanced deep learning methods, image processing, and computer vision techniques for real-time crime prediction and prevention. …”
Get full text
Article -
8494
-
8495
-
8496
Treatment of chronic apical periodontitis on the basis of the modern concept of endodontics (clinical case)
Published 2020-04-01Get full text
Article -
8497
Study on Title Encoding Methods for e-Commerce Downstream Tasks
Published 2022-05-01“…We also propose an adaptation of a deep network architecture from the Computer Vision field: ``Bootstrap Your Own Latent'' (BYOL), to learn product embeddings based on the title and compare it to several industrial baselines as well as some state-of-the-art supervised models. …”
Get full text
Article -
8498
-
8499
Selected Topics on Advanced Information Systems Engineering: Editorial Introduction to the Issue 5 of CSIMQ
Published 2015-12-01“…., conceptual modeling, database systems, business process management, requirements engineering, human computer interaction, and enterprise computing to address various practical challenges in development and application of information systems. …”
Get full text
Article -
8500
CURRENT POSSIBILITIES OF RADIATION DIAGNOSIS OF PROSTATE CANCER
Published 2017-12-01“…The paper discusses their sensitivity and specificity and the role and relationship in the diagnostic process. It also gives current unified mpMRI reporting and data system version 2 (RADSv.2). …”
Get full text
Article